Sciweavers

1005 search results - page 28 / 201
» Practical Secure Function Evaluation
Sort
View
DATE
2008
IEEE
81views Hardware» more  DATE 2008»
14 years 3 months ago
Practical Implementation of a Network Analyzer for Analog BIST Applications
This paper presents a practical implementation of a network analyzer for analog BIST applications. The network analyzer consists of a sinewave generator and a sinewave evaluator b...
Manuel J. Barragan Asian, Diego Vázquez, Ad...
COMPSAC
2007
IEEE
14 years 3 months ago
An Adaptive Security Model for Multi-agent Systems and Application to a Clinical Trials Environment
We present in this paper an adaptive security model for Multi-agent systems. A security meta-model has been developed in which the traditional role concept has been extended. The ...
Liang Xiao 0002, Andrew Peet, Paul H. Lewis, Srina...
HICSS
2003
IEEE
124views Biometrics» more  HICSS 2003»
14 years 2 months ago
Knowledge Map Creation and Maintenance for Virtual Communities of Practice
This paper proposes a knowledge map management system to facilitate knowledge management in virtual communities of practice. To realize the proposed knowledge map management, we d...
Fu-ren Lin, Chih-ming Hsueh
MATA
2004
Springer
113views Communications» more  MATA 2004»
14 years 2 months ago
PEARL: A PErformance evaluAtor of cRyptographic aLgorithms for Mobile Devices
Abstract. Limited computational power imposes new challenges during the implementation of security and privacy solutions for mobile devices. The choice for the most appropriate cry...
José Bringel Filho, Windson Viana, Rossana ...
ICML
2006
IEEE
14 years 9 months ago
Practical solutions to the problem of diagonal dominance in kernel document clustering
In supervised kernel methods, it has been observed that the performance of the SVM classifier is poor in cases where the diagonal entries of the Gram matrix are large relative to ...
Derek Greene, Padraig Cunningham